Application

Quantum Shieldz Application

A security app product family that applies quantum convergence security technology to various objects such as IoT-based H/W devices, S/W apps (financial apps, etc.), NFTs (e-game items, etc.)

Open innovation
Diverse products and solutions

The main goal is to enhance the cybersecurity of various devices and data connected to the network by providing a more secure and suitable platform. We develop and supply various application applications by utilizing our underlying technologies such as QRNG and QCC.

  • Qlock authentication system: Overcoming the limitations of pattern authentication, quantum security technology convergence, non-face-to-face financial work, and App protection for various IoT devices

  • TRIGEN file distribution management system: Through OTP authentication with QRNG technology, only authorized users can access files stored in TRIGEN, a new concept storage device that is monitored in real time

QLock

Behavior-based pattern authentication convergence security solution with quantum security technology applied

Quantum random numbers can be applied to security hardware as well as various software applications. Qlock Application was developed to solve the security vulnerabilities of Pattern Lock and can be applied to various authentication systems.


Existing Pattern Lock has a very serious vulnerability through shoulder surfing attack , etc. QLock is a new quantum fusion security technology that has improved these security issues.

    • A new authentication technology that improves security by using quantum random numbers and touch sensing technology in the existing vulnerable pattern authentication

    • Patented technology blocking when unauthorized person attempts the same pattern authentication

    • QRNG

    • Symmetric key encryption

    • ECDSA quantum private key

    • Quantum public key encryption

    • Quantum random number Nonce, SALT (PBKDF2 derivation function), etc.

    • Smudge attack

    • Thermal attack

    • Shoulder Surfing attack

    • Credential stuffing attack, etc. can be defended

    • Can be used for web, app login authentication, payment authentication, identity authentication, screen lock authentication, etc.

    • EYL’s the secure voice device solution applied to Quantum Shieldz Cipher

TRIGEN file distribution management system

64G Byte USB storage device combined with QRNG technology

TriGen is a new-concept 64G Byte USB storage device combined with QRNG technology to supplement the safety of USB storage devices that were convenient but banned due to security issues.


[ TRIGEN operation and configuration ]

  • Quantum OTP which is authenticated and used, installed on a personal PC and delivered to an authorized user's mobile phone

  • Real-name USB storage device implementation to prevent corporate data leakage

  • Centralized security monitoring for all actions (file creation, copying, updating, etc.), file distribution, and information asset distribution process after installed in PC

    • User PC Lock

    • TriGen Lock

    • Automatic locking in case of authentication error more than 3 times

    • permission to third party use through mutual authentication, network access right control for each user

    • remote destruction in case of loss

    • and real-time IP tracking

    • PC are provided to overseas business travelers, but only necessary files are copied to TriGen before business trips and used to prevent leakage of company data. Central monitoring system monitor how it is being used on a business trip.

    • When large-sized floor plan needs to be delivered to secondary or tertiary vendors, third-party function monitor who is using the file and how it is being used.

    • Record the distribution process of files by paying them to departments in charge of important and confidential files such as research institutes and finance departments.

IoTyzer

Web-implemented security verification framework

It can be used with QCM or separately. It performs a randomness test for key generation, a cryptographic algorithm security test, and a side-channel attack test, and provides the result as an automatic report.

  • • Using probabilistic and statistical tests for entropy sources from NIST SP 800-90B and BSI's AIS 31.

    • Check the quality of the random number sequence generated by the random number generator and evaluate its suitability in cryptographic work

  • • Provides an easy way of verifing encryption algorithms deployed in IoT devices and operated in various service environments are correctly implemented according to specifications

    • You can use this system even during development

  • • The EYL IoTyzer Side Channel Attack (SCA) test provides an online platform for evaluating common side-channel leaks in cryptographic module implementations.

    • The test set includes :

    o CRI Test Vector Leakage Assessment (TVLA)

    o Mutual Information test

    o Kullback-Leibler (KL) divergence test

QCM

Development Kit for Crypto Developers

QCM (Quantum Crypto Module) is connected with applications such as technology kernel for product shell developers, Iotyzer, etc. during QCC development.

  • • SCA (Side Channel Attack) analysis

    • Hardware chip encryption design and testing

  • • IoT device or chip developer

    • Side channel defense technology researcher

  • • Able to test with security verification framework “IoTyzer”

    • Mixed design of FPGA and MCU for implementing various functions is possible

    • Capable of complex design or testing of firmware and RTL code

E2E Encryption Solution

• A device that implements KCMVP encrypted communication by simply connecting to products that transmit and receive images or data, such as CCTV and drones, without making any special changes.

• Provides sectional encryption by encrypting Ethernet packets on a specific IP and port.

• Paired devices use quantum random number and elliptic curve-based key generation/key agreement algorithms to generate and encrypt a new session key generated for each session.

• Pre-entered authentication keys are securely stored in the Hardware Security Module (HSM) within the Quantum Shieldz® NanoversTM NC11 chip.

• Designed to output only the session key for encryption generated through authentication and key agreement with the paired device to the cryptographic operation.

  • CPU

    • Broadcom BCM2711, Quadcore Cortex-A72 64 bit 1.5GHz

    Memory

    • 4GB LPDDR4

    Interface

    • 2 Gigabit Internet

    OS

    • Debian

    Storage medium

    • 8G eMMC for operating system and data storage loading

    Environments

    • Operating temperature -20℃ to 70

    Power supply

    • 5V / 3A DC supply

    Cryptographic Module

    • EYL Cryptolib 1.0 KCMVP Verified Crypto module.

    Key Storage

    • Quantum Shieldz® Nanovers NC11

  • Block Cipher Algorithms

    • LEA 128/192/256

    Operation Mode

    • CTR

    Key agreement algorithm

    • ECDH(Elliptic Curve Diffie-Hellman)

    Elliptic Curve

    • NIST P-256(secp256r1)

    Hash function

    • SHA-256

    Message authentication codes

    • HMAC(Keyed-Hash Message Authentication Code)

    Encryption speed

    • 70 Mbps, 4 Full HD videos simultaneously or 4K video processing

    Protocol

    • Ethernet UDP

    Communication method

    • 1:1 peer to peer communication, 1:N communication

  • Processor

    • ARM 32-bit Cortex-M4 CPU with FPU

    • JTAG and SWD Debugger

    Cryptographic Hardware Accelerator

    • AES 128, 192, 256

    • SHA-256

    Random Number Generator

    • EYL’s unique Quantum Random Number Generator with QEC

    Embedded Memory

    • 1MB of Flash memory for user Program

    • Flash Accelerator : 4-Way 8KB

    • 8 KBytes Internal SRAM for Instruction

    • 256 KBytes Internal SRAM for Data

    Boot Modes

    • Serial Flash Booting / Debugger Booting

    External Memory Interface

    • SRAM Memory I/F

    • 4Mbytes Address

    • 32bit Data width

    USB 1.1 Full-Speed Device Compatible

    • Supports Full-speed Data Rate 12Mbps